[1]
“IMPLEMENTATION OF NETWORK SECURITY AND INTRUSION DETECTION SYSTEM USING DATA MINING TECHNIQUES”, scholar, vol. 8, no. 2.4, Nov. 2019, Accessed: Mar. 09, 2025. [Online]. Available: https://jconsortium.com/index.php/scholar/article/view/210